Results 251 to 260 of about 287,204 (299)
Simulation of film transmission path based on ant colony optimization algorithm. [PDF]
Wang Y.
europepmc +1 more source
Energy aware stable path ad hoc on-demand distance vector algorithm for extending network lifetime of mobile ad hoc networks. [PDF]
Legesse T+3 more
europepmc +1 more source
Networks with cognitive packets [PDF]
Based on our earlier work ("Towards networks with intelligent packets", Proc. 14th Int. Symp. on Computer and Information Sciences, p. 1-11, Oct. 1999), we discuss packet networks in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols.
Zhiguang Xu, Erol Gelenbe, Ricardo Lent
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Packet Flow on Telecommunication Networks
SIAM Journal on Mathematical Analysis, 2006The aim of this paper is to introduce a macroscopic fluid dynamic model dealing with the flow of information on a telecommunication network encoded in packets. Taking an intermediate time and space scale, we propose a model similar to that introduced recently for car traffic; see [G. M. Coclite, M. Garavello, and B. Piccoli, SIAM J. Math.
D'APICE, Ciro+2 more
openaire +4 more sources
Proceedings 11th International Conference on Tools with Artificial Intelligence, 2003
We propose cognitive packet networks (CPN) in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols. Cognitive packets within a CPN route themselves. They are assigned goals before entering the network and pursue these goals adaptively.
Erol Gelenbe, E. Seref, Zhiguang Xu
openaire +2 more sources
We propose cognitive packet networks (CPN) in which intelligent capabilities for routing and flow control are concentrated in the packets, rather than in the nodes and protocols. Cognitive packets within a CPN route themselves. They are assigned goals before entering the network and pursue these goals adaptively.
Erol Gelenbe, E. Seref, Zhiguang Xu
openaire +2 more sources
Packet Switched Networks [PDF]
The trend towards common user packet switched networks has increased the need for the provision of adequate end-to-end security techniques in order to protect the data of individual groups of network users. The techniques which can be employed in order to provide adequate end-to-end security measures are considered in this paper frc,mamilitary ...
openaire +1 more source
Packet Sniffers and Network Monitors
Information Systems Security, 2000Abstract Communications take place in forms that range from simple voice conversations to complicated manipulations of light. Each type of communication is based on two basic principles: wave theory and particle theory. In essence, communication can be established by the use of either, frequently in concert with a carrier or medium to provide ...
James S. Tiller, Bryan D. Fish
openaire +2 more sources
Packet by Packet Analysis in Contemporary Network Simulators
IEEE Latin America Transactions, 2006This article presents a comparative study of three hybrid network simulators: OPNET’s Modeler and ns-2, as well as NCTUns. In order to fulfill this, the simulated results were compared with the results obtained from a real network testbed using a packet by packet analysis methodology. Using a generic network based in an experimental network and modeled
Emmanuel Jammeh+5 more
openaire +2 more sources